DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian National Indicted for Conspiracy to Introduce Malware into a Computer Network

Posted on September 5, 2020 by Dissent

One of the big stories this week concerned a failed attempt to bribe a Tesla employee to inject malware into Tesla’s system. The attempt failed because the employee reported what was going on.  From the U.S. Department of Justice:

A federal grand jury in the District of Nevada returned an indictment today charging a Russian national for his role in a conspiracy to intentionally cause damage to a protected computer.

Acting Assistant Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division, U.S. Attorney Nicholas A. Trutanich of the District of Nevada, and Special Agent in Charge Aaron C. Rouse of the FBI’s Las Vegas Field Office made the announcement.

The indictment alleges that Egor Igorevich Kriuchkov, 27, a citizen of Russia, attempted to recruit an employee of a company located in Nevada, with the purpose of introducing malicious software into the company’s computer network, extracting data from the network, and thereafter extorting ransom money from the company under the threat of making the extracted data public.

According to the indictment, from about July 16, 2020, to about Aug. 22, 2020, Kriuchkov conspired with associates to recruit an employee to introduce malware into the computer network of the employee’s company.

The malware would purportedly provide Kriuchkov and his co-conspirators with access to the data within the computer system. After the malware was introduced, Kriuchkov and his co-conspirators would extract data from the network and then threaten to make the information public, unless the company paid their ransom demand.

Kriuchkov was arrested on Aug. 22, 2020, in Los Angeles, California and had his initial appearance before U.S. Magistrate Judge Alexander F. MacKinnon of the U.S. District Court in the Central District of California.   Kriuchkov was detained pending trial and has not yet appeared in the District of Nevada.

An indictment merely alleges that crimes have been committed. The defendant is presumed innocent until proven guilty beyond a reasonable doubt.

The investigation was led by the FBI’s Las Vegas Field Office with assistance by the FBI’s Los Angeles and Sacramento Field Offices and the Washoe County (Nevada) Sheriff’s Office.  The case is being prosecuted by Senior Counsel C.S. Heath and Trial Attorney Thomas Dettore of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Richard Casper of the District of Nevada.

The year 2020 marks the 150th anniversary of the Department of Justice.  Learn more about the history of our agency at www.Justice.gov/Celebrating150Years.

Category: Breach IncidentsMalwareOf NoteU.S.

Post navigation

← FBI issues second alert about ProLock ransomware stealing data
CNN-News18 allegedly hacked to deny PayTM hack claims →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas gastroenterology and surgical practice victim of ransomware attack
  • Romanian Citizen Pleads Guilty to ‘Swatting’ Numerous Members of Congress, Churches, and Former U.S. President
  • North Dakota Enacts Financial Data Security and Data Breach Notification Requirements
  • Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says
  • Vanta bug exposed customers’ data to other customers
  • Lyrix Ransomware Targets Windows Users with Advanced Evasion Techniques
  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Supreme Court Agrees to Clarify Emergency Situations Where Police Don’t Need Warrant
  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.